A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
As internet encryption has grown to safeguard users’ privacy, malware has evolved to leverage encryption protocols such as Transport Layer Security (TLS) to conceal its hazardous connections. The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detectio...
| 第一著者: | |
|---|---|
| フォーマット: | 学位論文 |
| 言語: | 英語 |
| 出版事項: |
2022
|
| 主題: | |
| オンライン・アクセス: | http://eprints.usm.my/60044/ |
| Abstract | Abstract here |
| _version_ | 1855633035012079616 |
|---|---|
| author | Keshkeh, Kinan |
| author_facet | Keshkeh, Kinan |
| author_sort | Keshkeh, Kinan |
| description | As internet encryption has grown to safeguard users’ privacy, malware has evolved to leverage encryption protocols such as Transport Layer Security (TLS) to conceal its hazardous connections. The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detection System (IDS) has driven numerous research studies to focus on anomaly-based malware detection without decryption employing various features and Machine Learning (ML) algorithms. Nonetheless, several of these studies used flow features with low feature importance value and poor capability to distinguish malicious flows, such as the number of packets sent and received in a flow or its duration. Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. TLSMalDetect includes periodicity-independent entropy-based flow set (EFS) features produced by an FFT technique. The efficiency of EFS features is assessed in two ways: (1) by comparing them to the relevant related work’s features of outliers and flow using four feature importance methods, and (2) by analyzing the classification performance in the scenarios with and without EFS features. This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy. |
| first_indexed | 2025-10-17T08:47:39Z |
| format | Thesis |
| id | usm-60044 |
| institution | Universiti Sains Malaysia |
| language | English |
| last_indexed | 2025-10-17T08:47:39Z |
| publishDate | 2022 |
| record_format | EPrints |
| record_pdf | Restricted |
| spelling | usm-600442024-03-04T01:20:45Z http://eprints.usm.my/60044/ A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features Keshkeh, Kinan QA75.5-76.95 Electronic computers. Computer science As internet encryption has grown to safeguard users’ privacy, malware has evolved to leverage encryption protocols such as Transport Layer Security (TLS) to conceal its hazardous connections. The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detection System (IDS) has driven numerous research studies to focus on anomaly-based malware detection without decryption employing various features and Machine Learning (ML) algorithms. Nonetheless, several of these studies used flow features with low feature importance value and poor capability to distinguish malicious flows, such as the number of packets sent and received in a flow or its duration. Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. TLSMalDetect includes periodicity-independent entropy-based flow set (EFS) features produced by an FFT technique. The efficiency of EFS features is assessed in two ways: (1) by comparing them to the relevant related work’s features of outliers and flow using four feature importance methods, and (2) by analyzing the classification performance in the scenarios with and without EFS features. This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy. 2022-11 Thesis NonPeerReviewed application/pdf en http://eprints.usm.my/60044/1/24%20Pages%20from%20KINAN%20KESHKEH.pdf Keshkeh, Kinan (2022) A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features. Masters thesis, Perpustakaan Hamzah Sendut. |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Keshkeh, Kinan A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features |
| thesis_level | Master |
| title | A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features |
| title_full | A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features |
| title_fullStr | A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features |
| title_full_unstemmed | A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features |
| title_short | A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features |
| title_sort | machine learning classification approach to detect tls based malware using entropy based flow set features |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://eprints.usm.my/60044/ |
| work_keys_str_mv | AT keshkehkinan amachinelearningclassificationapproachtodetecttlsbasedmalwareusingentropybasedflowsetfeatures AT keshkehkinan machinelearningclassificationapproachtodetecttlsbasedmalwareusingentropybasedflowsetfeatures |
